UCSY's Research Repository

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Browsing Tenth International Conference On Computer Applications (ICCA 2012) by Title

Sort by: Order: Results:

  • Yee, Tin Tin; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Cloud storage system architecture and design plays a vital role in the cloud computing infrastructure. Cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of ...
  • Yu, May The`; Sein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Interest in the potential of digital images has increased enormously over the last few years, fuelled at least in part by the rapid growth of imaging on the World-Wide Web. Automatically assigning keywords to images ...
  • Hlaing, Zar Chi Su Su; Khine, May Aye (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The Ant Colony Optimization (ACO) is a metaheuristic algorithm used for combinatorial optimization problems. It is a good choice for many hard combinatorial problems because it is more efficient and produces better ...
  • Thein, Myint Myint (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Keyword search is an easy and potentially effective way to find information that is stored in relational database for ordinary users or web users. As results needed by user are assembled from joining tuples of multiple ...
  • Myint, Julia; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data availability is one of the key requirements for cloud storage system. Data replication has been widely used as a mean of increasing the availability in traditional distributed databases, peer-to-peer (P2P) systems, ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Data storage management plays a vital role in cloud computing environment. The researchers are still trying to make the cloud data storage system to be more mature. And there are two major requirements of datastores ...
  • Tun, Tayar Myo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The various positioning application meets strict needs such as car navigation, mapping, surveying, security, agriculture and so on. An Intelligent Cruise control system is simulated and demonstrated using GPS as the ...
  • Phyue, Soe Lai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The lexical analysis within the context of language processing is to connect each word with its corresponding label in a lexicon. However, many words have more than one meaning, ambiguity word, which may make it impossible ...
  • Myint, Phyu Hninn; Htwe, Tin Myat; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Part-of-speech (POS) tagging is the process of assigning the part-of-speech tag or other lexical class marker to each and every word in a sentence. In many Natural Language Processing (NLP) applications such as word ...
  • Myint, Khin Swe Swe (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Virtualization techniques provide the carving individual physical servers into multiple virtual containers that can be run and managed separately. However, due to the uncertainty of workload variation, the workloads ...
  • Aung, Ohnmar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    MapReduce is well-applied in high performance computing for large scale data processing. However, as long as the clusters grow, handling with huge amount of intermediate data produced in the shuffle and reduce phases ...
  • Zin, Wai Wai (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Due to advances in technologies, most of the information is kept electronically. Steganography and Cryptography are two popular ways of sending vital information in a secret way. In this paper, an image steganography ...
  • Oladipupo, Bilesanmi Yusuf; Thu, Ye Kyaw; Yoshiyori, Urano (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In recent years, the smart grid has occupied the area of power and grid management research and indeed a lot of brilliant works have been done. Nevertheless, most of these works have been designed only for the improvement ...
  • Thaw, Tin Zar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The eXtensible Markup Language (XML) based web applications are used for data representing, exchanging and storing via internet by the usage of XML standard schema. If XML schema files are difficult to understand ...
  • Khaing, Hnin Su (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    With the maturity of Geographical Positioning System (GPS), wireless, and Web technologies, increasing amounts of movement data collected from various moving objects, such as animals, vehicles, mobile devices, and ...
  • Phyo, Zar Lwin (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    The workload in each node changes dynamically over time in large-scale data centers, so the workload in some machines may exceeds the threshold, which not only can’t guarantee the quality of service requirements (QOS), ...
  • Thu, Soe Myat (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In this paper, content-based music similarity function from acoustic music signal in an efficient way is considered. This function is to determine similarities among songs, particularly, a piece of input music ...
  • Ko, Aye Chan; Aung, Nay Aung (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Steganography is the approach for hiding any secret message in a variety of multimedia carriers like text, images, audio or video files. Whenever hiding a secret message, it is very important to make it invisible. This ...
  • Aung, Myintzu Phyo (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    Noun Phrase Identification is one of the most critical components of natural language processing because information retrieval systems of all kinds rely on base-noun phrase as their primary source of entity ...
  • Zin, Thet Thet; Soe, Khin Mar; Thein, Ni Lar (Tenth International Conference On Computer Applications (ICCA 2012), 2012-02-28)
    In statistical machine translation (SMT), the currently best performing systems are based in some way on phrases or word groups. In this paper, phrase-based translation system is described. Translation model and ...

Search Repository



Browse

My Account